* CVE-2021-33198 Description: "The SetString and UnmarshalText methods of math/big.Rat may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents. This is issue #45910 and CVE-2021-33198." * CVE-2021-33197 Description: "ReverseProxy in net/http/httputil could be made to forward certain hop-by-hop headers, including Connection. In case the target of the ReverseProxy was itself a reverse proxy, this would let an attacker drop arbitrary headers, including those set by the ReverseProxy.Director. This is issue #46313 and CVE-2021-33197." * CVE-2021-33195 Description: "The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in net, and their respective methods on the Resolver type may return arbitrary values retrieved from DNS which do not follow the established RFC 1035 rules for domain names. If these names are used without further sanitization, for instance unsafely included in HTML, they may allow for injection of unexpected content. Note that LookupTXT may still return arbitrary values that could require sanitization before further use. This is issue #46241 and CVE-2021-33195." * CVE-2021-33196 Description: "The NewReader and OpenReader functions in archive/zip can cause a panic or an unrecoverable fatal error when reading an archive that claims to contain a large number of files, regardless of its actual size. This is issue #46242 and CVE-2021-33196."
I'm fine with starting stabilization. I will do amd64. Thanks, William
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=05e474c5bacc8c07800cc68b48f8b6c5f9cb686d commit 05e474c5bacc8c07800cc68b48f8b6c5f9cb686d Author: William Hubbs <williamh@gentoo.org> AuthorDate: 2021-06-07 19:37:51 +0000 Commit: William Hubbs <williamh@gentoo.org> CommitDate: 2021-06-07 19:38:13 +0000 dev-lang/go: stabilize 1.15.13 and 1.16.5 on amd64 Bug: https://bugs.gentoo.org/794784 Package-Manager: Portage-3.0.18, Repoman-3.0.2 Signed-off-by: William Hubbs <williamh@gentoo.org> dev-lang/go/go-1.15.13.ebuild | 2 +- dev-lang/go/go-1.16.5.ebuild | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)
x86 stable
ppc64 stable
arm64 done
arm done all arches done
Please cleanup, thanks!
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=72ef4756cd6ea690536a66e57f10512e90af9764 commit 72ef4756cd6ea690536a66e57f10512e90af9764 Author: William Hubbs <williamh@gentoo.org> AuthorDate: 2021-07-01 16:47:34 +0000 Commit: William Hubbs <williamh@gentoo.org> CommitDate: 2021-07-01 16:48:06 +0000 dev-lang/go: remove vulnerable versions Bug: https://bugs.gentoo.org/794784 Package-Manager: Portage-3.0.20, Repoman-3.0.2 Signed-off-by: William Hubbs <williamh@gentoo.org> dev-lang/go/Manifest | 2 - dev-lang/go/go-1.15.12.ebuild | 189 ------------------------------------------ dev-lang/go/go-1.16.4.ebuild | 189 ------------------------------------------ 3 files changed, 380 deletions(-)
Unable to check for sanity: > no match for package: dev-lang/go-1.15.13
The oldest version of dev-lang/go in the tree is 1.17.5.